Middle-East Journal of Scientific Research 24 (3): 980-985, 2016
ISSN 1990-9233
© IDOSI Publications, 2016
DOI: 10.5829/idosi.mejsr.2016.24.03.23190
Corresponding Author: Iniya Shree, Department of IT, Karpagam College of Engineering, Coimbatore, India.
980
Providing Biometrics Security for Load Balanced Cloud Data Storage
Iniya Shree, C. Vijesh Joe, K. Narmatha and S. Shinly Swarna Sugi
1 1 1 2
Department of IT, Karpagam College of Engineering, Coimbatore, India
1
Department of CSE, Karpagam College of Engineering, Coimbatore, India
2
Abstract: Sensitive data to be stored in the cloud is to be prevented from unauthorized access. To perform this
prevention the entire data is to be split into many partitions and the encrypted partition of files are stored in
different services. Whenever the data is required to be accessed the parts are retrieved, combined and
decrypted. Even though the unauthorized person retrieve’s all portions of the server, the retriever may not be
aware of the data splitting technique used, nor the encryption algorithm used. The methodology is applied to
compare a number of well-known data splitting techniques. In this approach a key of 128 bit that is generated
from palm vein of the authorized user. By using that key, the user can decrypt the data. Distributed system is
the one that determines the secure data storage in cloud environment. Even each server in the distributed
system can be abstracted as storage node and data may be stored based upon the characteristics of the node.
Also load balancing in storage of cloud data is also tried to be achieved with optimal power consumption.
Key words: Encryption Data Splitting Techniques Biometric Cloud Storage Distributed system Palm
vein
INTRODUCTION provider and made available to customers over a network,
typically the Internet. SaaS is becoming an increasingly
Information security and privacy has become a vital prevalent delivery model as underlying technologies that
issue that to be firmly store in cloud. Biometric supports for Web services and service-oriented
recognition is one in every of the techniques for the architecture (SOA) mature and new developmental
protection privacy because of its distinctive nature of approaches, such as Ajax etc... Meanwhile, broadband
biometric traits like palm vein, fingerprints, etc…. service has become increasingly available to support user
Cryptographic key generation from palm vein has gained access from more areas. SaaS is closely related to the ASP
its quality because of its security purpose. Within the (application service provider) and on demand computing
crypto logical technique the initial data is encoded by software delivery models. IDC identifies two slightly
mistreatment key generated from palm vein so it's not in different delivery models for SaaS. The hosted application
an exceedingly perceivable format for the attacker. The management (hosted AM) model is similar to ASP; a
uploaded original data is split in too several elements and provider hosts commercially available software for
so encrypted. The original data are often obtained by customers and delivers it over the Web. In the software
decoding the encoded knowledge mistreatment identical on demand model, the provider gives customers network-
key. Thus the privacy is well protected during this based access to a single copy of an application created
approach. specifically for SaaS distribution. The hardware and
Cloud Computing refers the applications given as software in the data center refers to as cloud. When
services over the Internet and system software in the data service to Cloud is provided in a pay-as-you-go manner
centers that helps in providing those services. These for the usage of public, it is referred to as a Public Cloud,
services themselves are referred to as Software as a whereas the service that is being sold entirely is referred
Service (SaaS) [1]. It is a software distribution model in to as Utility Computing [2]. Private Cloud refers to data
which applications are hosted by a vendor or service centers of an organization or enterprise which shares data